<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Neno,Thanks for the reply. in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532446#M73324</link>
    <description>&lt;P&gt;Hi Neno,&lt;/P&gt;&lt;P&gt;Thanks for the reply.. As we checked the port is going in error-disable with by phone mac address wherein phone is connected 24/7 and machine connects from phone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find below logs from switch -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:11: %AUTHMGR-5-START: Starting 'dot1x' for client (e804.62eb.b435) on Interface Gi5/30 AuditSessionID AC1232470000E906E5392F07 &lt;STRONG&gt;======Phone MAC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %AUTHMGR-5-START: Starting 'dot1x' for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E907E53931BF &lt;STRONG&gt;======Laptop MAC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %AUTHMGR-5-START: Starting 'dot1x' for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E908E539329B&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %DOT1X-5-SUCCESS: Authentication successful for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E908E539329B&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %AUTHMGR-7-RESULT: Authentication result 'success' from 'dot1x' for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E908E539329B&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0026.b9eb.28ec| AuditSessionID AC1232470000E908E539329B| AUTHTYPEDOT1X| EVENT APPLY&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %EPM-6-IPEVENT: IP 0.0.0.0| MAC 0026.b9eb.28ec| AuditSessionID AC1232470000E908E539329B| AUTHTYPE DOT1X| EVENT IP-WAIT&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %AUTHMGR-5-SECURITY_VIOLATION: Security violation on the interface GigabitEthernet5/30, new MAC address (e804.62eb.b435) is seen.AuditSessionID&amp;nbsp; Unassigned&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %PM-4-ERR_DISABLE: security-violation error detected on Gi5/30, putting Gi5/30 in err-disable state&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %AUTHMGR-5-START: Starting 'dot1x' for client (e804.62eb.b435) on Interface Gi5/30 AuditSessionID AC1232470000E909E53935F3&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0026.b9eb.28ec| AuditSessionID AC1232470000E908E539329B| AUTHTYPEDOT1X| EVENT REMOVE&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %PM-4-ERR_DISABLE: STANDBY:security-violation error detected on Gi5/30, putting Gi5/30 in err-disable state&lt;/P&gt;&lt;P&gt;Can you guide us how to fix this one&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pranav&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2014 08:06:36 GMT</pubDate>
    <dc:creator>Pranav Gade</dc:creator>
    <dc:date>2014-10-02T08:06:36Z</dc:date>
    <item>
      <title>Port security and 802.1x (ISE)</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532438#M73316</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm implemmenting ISE in a network with Port Security enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According the book&amp;nbsp;&lt;STRONG&gt;Cisco ISE for BYOD and Secure Unified Access&amp;nbsp;&lt;/STRONG&gt;Port-security is not compatible with 802.1x.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to know what is the affectation of to have Port-security and 802.1x enabled on the same SW Port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Someone?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 04:59:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532438#M73316</guid>
      <dc:creator>jc.saavedra</dc:creator>
      <dc:date>2019-03-11T04:59:01Z</dc:date>
    </item>
    <item>
      <title>There a lot of different</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532439#M73317</link>
      <description>&lt;P&gt;There a lot of different commands, features and scenarios. Can you help us answer your question by telling us what exactly you are trying to accomplish?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Aug 2014 05:15:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532439#M73317</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-08-30T05:15:47Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,  The scenario is: on</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532440#M73318</link>
      <description>&lt;P&gt;Hi Neno,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The scenario is: on the same SW port I have configured:&lt;/P&gt;&lt;P&gt;interface GigabitEthernet1/0/25&lt;BR /&gt;&amp;nbsp;description PC Jeremias Castro&lt;BR /&gt;&amp;nbsp;switchport access vlan 2008&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan 2108&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;switchport port-security maximum 3&lt;BR /&gt;&amp;nbsp;switchport port-security&lt;BR /&gt;&amp;nbsp;switchport port-security aging time 5&lt;BR /&gt;&amp;nbsp;switchport port-security violation restrict&lt;BR /&gt;&amp;nbsp;switchport port-security aging type inactivity&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;ip arp inspection limit rate 30&lt;BR /&gt;&amp;nbsp;authentication event fail action next-method&lt;BR /&gt;&amp;nbsp;authentication event server dead action authorize vlan 2008&lt;BR /&gt;&amp;nbsp;authentication event server dead action authorize voice&lt;BR /&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;BR /&gt;&amp;nbsp;authentication host-mode multi-auth&lt;BR /&gt;&amp;nbsp;authentication open&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;authentication order dot1x mab&lt;BR /&gt;&amp;nbsp;authentication priority dot1x mab&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication violation restrict&lt;BR /&gt;&amp;nbsp;mab&lt;BR /&gt;&amp;nbsp;macro description Phone-Host&lt;BR /&gt;&lt;STRONG&gt;&amp;nbsp;dot1x pae authenticator&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;dot1x timeout tx-period 3&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The port is configured to work with 802.1x and Port-security.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question is, what is the problem if I have this config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Sep 2014 14:51:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532440#M73318</guid>
      <dc:creator>jc.saavedra</dc:creator>
      <dc:date>2014-09-01T14:51:47Z</dc:date>
    </item>
    <item>
      <title>Using 802.1X with Port</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532441#M73319</link>
      <description>&lt;H3 class="p_H_Head2"&gt;Using 802.1X with Port Security&lt;/H3&gt;&lt;P&gt;&lt;A name="wp1053039"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;You can enable an 802.1X port for port security by using the &lt;B class="cBold"&gt;dot1x multiple-hosts &lt;/B&gt;interface configuration command. You must also configure port security on the port by using the &lt;B class="cBold"&gt;switchport port-security&lt;/B&gt; interface configuration command. With the multiple-hosts mode enabled, 802.1X authenticates the port, and port security manages network access for all MAC addresses, including that of the client. You can then limit the number or group of clients that can access the network through an 802.1X multiple-host port.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1049590"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pB1_Body1"&gt;These are some examples of the interaction between 802.1X and port security on the switch:&lt;/P&gt;&lt;P&gt;&lt;A name="wp1049976"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pBu1_Bullet1"&gt;•&lt;IMG alt="" border="0" height="2" src="http://www.cisco.com/c/dam/en/us/td/i/templates/blank.gif" width="19" /&gt;When a client is authenticated, and the port security table is not full, the client's MAC address is added to the port security list of secure hosts. The port then proceeds to come up normally.&lt;/P&gt;&lt;P&gt;&lt;A name="wp1052783"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pB2_Body2"&gt;When a client is authenticated and manually configured for port security, it is guaranteed an entry in the secure host table (unless port security static aging has been enabled).&lt;/P&gt;&lt;P&gt;&lt;A name="wp1049592"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pB2_Body2"&gt;A security violation occurs if the client is authenticated, but port security table is full. This can happen if the maximum number of secure hosts have been statically configured, or if the client ages out of the secure host table. If the client's address is aged out, its place in the secure host table can be taken by another host. In this case, you should enable periodic reauthentication with a shorter time period than the port security aging time.&lt;/P&gt;&lt;P class="pB2_Body2"&gt;If the port is administratively shut down the port becomes unauthenticated and all dynamic entries are removed from the secure host table.&lt;/P&gt;&lt;P class="pB2_Body2"&gt;For more details please refer: http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst3550/software/release/12-1_13_ea1/configuration/guide/3550scg/Sw8021x.html#wp1049580&lt;/P&gt;&lt;P class="pB2_Body2"&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Sep 2014 18:05:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532441#M73319</guid>
      <dc:creator>Moin Ilyas</dc:creator>
      <dc:date>2014-09-02T18:05:31Z</dc:date>
    </item>
    <item>
      <title>Thanks Moin, We have to</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532442#M73320</link>
      <description>&lt;P&gt;Thanks Moin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have to configure the port with &lt;EM&gt;authentication host-mode multi-domain&amp;nbsp;&lt;/EM&gt;and remove the por-security.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Sep 2014 12:56:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532442#M73320</guid>
      <dc:creator>jc.saavedra</dc:creator>
      <dc:date>2014-09-04T12:56:42Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,I am also having some</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532443#M73321</link>
      <description>&lt;P&gt;Hi Neno,&lt;/P&gt;&lt;P&gt;I am also having some what similar kind off issue .&lt;/P&gt;&lt;P&gt;I am implementing 802.1x with port security for end user access machine with Anyconnect and ISE&amp;nbsp;. Wherein some dell Laptop&amp;nbsp;with docket having issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue - If dell laptop user connect there machine with docket then port goes in error disable (laptop having connection from IP Phone) &amp;nbsp;then phone also gets disable.This only happens when then first time connect their laptop on&amp;nbsp;docket&lt;/P&gt;&lt;P&gt;ISE Configuration - We have configured machine + user authentication with dotx method&amp;nbsp;&lt;/P&gt;&lt;P&gt;Switch Configuration -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;interface GigabitEthernetX/X&lt;BR /&gt;&amp;nbsp;switchport access vlan X&lt;BR /&gt;&amp;nbsp;switchport mode access&lt;BR /&gt;&amp;nbsp;switchport voice vlan X&lt;BR /&gt;&amp;nbsp;switchport port-security maximum 2&lt;BR /&gt;&amp;nbsp;switchport port-security maximum 1 vlan access&lt;BR /&gt;&amp;nbsp;switchport port-security maximum 1 vlan voice&lt;BR /&gt;&amp;nbsp;switchport port-security&lt;BR /&gt;&amp;nbsp;switchport port-security violation restrict&lt;BR /&gt;&amp;nbsp;switchport port-security mac-address sticky&lt;BR /&gt;&amp;nbsp;switchport port-security mac-address sticky XX.XX.XX&lt;BR /&gt;&amp;nbsp;switchport port-security mac-address sticky XX.XX.XX&amp;nbsp;vlan voice &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;SPAN style="font-size: 14px;"&gt;authentication event server dead action authorize vlan XX&lt;/SPAN&gt;&lt;BR /&gt;&amp;nbsp;authentication event server alive action reinitialize&lt;BR /&gt;&amp;nbsp;authentication port-control auto&lt;BR /&gt;&amp;nbsp;authentication open &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;auto qos voip cisco-phone&lt;BR /&gt;&amp;nbsp;dot1x pae authenticator&lt;BR /&gt;&amp;nbsp;spanning-tree portfast&lt;BR /&gt;&amp;nbsp;spanning-tree bpduguard enable&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Laptop model issue - Dell latitude e4310 &amp;nbsp;and e6510&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anybody help me on this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 08:57:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532443#M73321</guid>
      <dc:creator>Pranav Gade</dc:creator>
      <dc:date>2014-09-30T08:57:55Z</dc:date>
    </item>
    <item>
      <title>In general I stay away from</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532444#M73322</link>
      <description>&lt;P&gt;In general I stay away from port-security if 802.1x is enabled. I personally don't see the benefit and IMO it only adds additional administrative overhead. In your scenario I believe the port becomes error disabled because you are exceeding the maximum allowed mac addresses, which in your configuration is 2. The reason you are exceeding this with the dock is because 99% of the time the dock also has its own mac address. So you in your scenario you end up with 3 total mac addresses on the port: One for the phone, one for the pc and one from the docking station.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 17:19:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532444#M73322</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-30T17:19:26Z</dc:date>
    </item>
    <item>
      <title>Sorry, somehow I missed your</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532445#M73323</link>
      <description>&lt;P&gt;Sorry, somehow I missed your reply and never replied back to you. Yes, in general I try to stay away from using dot1x and port-security in the same configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Glad your issue was resolved!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Sep 2014 17:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532445#M73323</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-09-30T17:20:28Z</dc:date>
    </item>
    <item>
      <title>Hi Neno,Thanks for the reply.</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532446#M73324</link>
      <description>&lt;P&gt;Hi Neno,&lt;/P&gt;&lt;P&gt;Thanks for the reply.. As we checked the port is going in error-disable with by phone mac address wherein phone is connected 24/7 and machine connects from phone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find below logs from switch -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:11: %AUTHMGR-5-START: Starting 'dot1x' for client (e804.62eb.b435) on Interface Gi5/30 AuditSessionID AC1232470000E906E5392F07 &lt;STRONG&gt;======Phone MAC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %AUTHMGR-5-START: Starting 'dot1x' for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E907E53931BF &lt;STRONG&gt;======Laptop MAC&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %AUTHMGR-5-START: Starting 'dot1x' for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E908E539329B&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %DOT1X-5-SUCCESS: Authentication successful for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E908E539329B&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %AUTHMGR-7-RESULT: Authentication result 'success' from 'dot1x' for client (0026.b9eb.28ec) on Interface Gi5/30 AuditSessionID AC1232470000E908E539329B&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0026.b9eb.28ec| AuditSessionID AC1232470000E908E539329B| AUTHTYPEDOT1X| EVENT APPLY&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:12: %EPM-6-IPEVENT: IP 0.0.0.0| MAC 0026.b9eb.28ec| AuditSessionID AC1232470000E908E539329B| AUTHTYPE DOT1X| EVENT IP-WAIT&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %AUTHMGR-5-SECURITY_VIOLATION: Security violation on the interface GigabitEthernet5/30, new MAC address (e804.62eb.b435) is seen.AuditSessionID&amp;nbsp; Unassigned&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %PM-4-ERR_DISABLE: security-violation error detected on Gi5/30, putting Gi5/30 in err-disable state&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %AUTHMGR-5-START: Starting 'dot1x' for client (e804.62eb.b435) on Interface Gi5/30 AuditSessionID AC1232470000E909E53935F3&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0026.b9eb.28ec| AuditSessionID AC1232470000E908E539329B| AUTHTYPEDOT1X| EVENT REMOVE&lt;/P&gt;&lt;P&gt;Oct&amp;nbsp; 1 09:21:13: %PM-4-ERR_DISABLE: STANDBY:security-violation error detected on Gi5/30, putting Gi5/30 in err-disable state&lt;/P&gt;&lt;P&gt;Can you guide us how to fix this one&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Pranav&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 08:06:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532446#M73324</guid>
      <dc:creator>Pranav Gade</dc:creator>
      <dc:date>2014-10-02T08:06:36Z</dc:date>
    </item>
    <item>
      <title>Add the following command to</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532447#M73325</link>
      <description>&lt;P&gt;Add the following command to your switchport and test again:&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;!--StartFragment--&gt;&lt;STRONG&gt;authentication host-mode multi-auth&amp;nbsp;&lt;/STRONG&gt;&lt;!--EndFragment--&gt;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&amp;nbsp;&lt;/P&gt;&lt;P style="margin:0in;font-family:Calibri;font-size:11.0pt"&gt;&lt;EM&gt;Thank you for rating helpful posts!&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 15:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/2532447#M73325</guid>
      <dc:creator>nspasov</dc:creator>
      <dc:date>2014-10-02T15:42:59Z</dc:date>
    </item>
    <item>
      <title>Re: Hi Neno,I am also having some</title>
      <link>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/3347507#M73326</link>
      <description>&lt;P&gt;Dude, you have port-security limiting this port for 1 mac-address, but you have IP Phone, than laptop with Docket, with 2 or maybe 3 mac-addresses in total on that port. Maybe that's the problem. What does the show log shows you?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could raise the mac-address limitation from 1 to 3 and remove the static mappings...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Mar 2018 12:08:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/port-security-and-802-1x-ise/m-p/3347507#M73326</guid>
      <dc:creator>suporteredes</dc:creator>
      <dc:date>2018-03-13T12:08:21Z</dc:date>
    </item>
  </channel>
</rss>

